C. Hernandez Ganan
Please Note
73 records found
1
WFE-Tab
Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
The machines are watching
Exploring the potential of Large Language Models for detecting Algorithmically Generated Domains
"All Sorts of Other Reasons to Do It"
Explaining the Persistence of Sub-optimal IoT Security Advice
Bits and Pieces
Piecing Together Factors of IoT Vulnerability Exploitation
RAMPAGE
A software framework to ensure reproducibility in algorithmically generated domains detection
Peering into the Darkness
The Use of UTRS in Combating DDoS Attacks
Poster
Empirical Analysis of Lifespan Increase of IoT C&C Domains
Intercept and Inject
DNS Response Manipulation in the Wild
Bin there, target that
Analyzing the target selection of IoT vulnerabilities in malware binaries
Lessons in Prevention and Cure
A User Study of Recovery from Flubot Smartphone Malware
Back-to-the-Future Whois
An IP Address Attribution Service for Working with Historic Datasets
Alert Alchemy
SOC Workflows and Decisions in the Management of NIDS Rules
Deployment of Source Address Validation by Network Operators
A Randomized Control Trial
No Spring Chicken
Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
Ruling the Rules
Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection